IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security ManagementReports
151 - 175 of 2704 Matches Previous Page  | Next Page
Leverage Security Event Data to Improve Vulnerability Detection & Remediation
sponsored by Intel Security
WHITE PAPER: Learn how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data for better and more accurate reporting.
Posted: 09 Sep 2014 | Published: 31 Oct 2013

Intel Security

Moving Beyond the Firewall for Complete Data Protection
sponsored by Fortinet, Inc.
WHITE PAPER: Check out this white paper to discover several new security threats and what solutions are available to mitigate those risks going forward.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

Fortinet, Inc.

What Your Enterprise Can Do to Optimize Provisioning Initiatives
sponsored by RSA, The Security Division of EMC
VIDEO: This video explains the crucial need to handle risk appropriately when dealing with access control.
Posted: 08 Sep 2014 | Premiered: 13 Aug 2014

RSA, The Security Division of EMC

The Current State of Identity and Access Management
sponsored by RSA, The Security Division of EMC
VIDEO: This video explains the major shift with Identity and Access Management (IAM) in the past few years.
Posted: 08 Sep 2014 | Premiered: 13 Aug 2014

RSA, The Security Division of EMC

BYOD Simplified Into 10 Steps
sponsored by Citrix
WHITE PAPER: Access this white paper to find out how to successfully use a BYOD program in the workplace with 10 simple steps.
Posted: 08 Sep 2014 | Published: 24 Jun 2014

Citrix

Improve Performance and Increase Value With A PC Refresh
sponsored by Dell, Inc. and Windows 8 Pro
WHITE PAPER: This white paper reveals three reasons to upgrade to new client systems in order to improve performance.
Posted: 08 Sep 2014 | Published: 29 Aug 2014

Dell, Inc. and Windows 8 Pro

Have Control Over Remote Access—It's Time to Deploy New Laptops
sponsored by Dell, Inc. and Windows 8 Pro
WHITE PAPER: This white paper reveals several helpful tips surrounding the secure deployment of new laptops.
Posted: 08 Sep 2014 | Published: 08 Sep 2014

Dell, Inc. and Windows 8 Pro

2014 Security Report: How DDoS Attacks Can Mask More Dangerous Malware Threats
sponsored by Neustar®
RESOURCE: In this informative report, discover key findings on the top strategies and techniques for dealing with new DDoS attacks.
Posted: 08 Sep 2014 | Published: 08 Sep 2014

Neustar®

McAfee Positioned in Leaders Quadrant of the Magic Quadrant for SIEM
sponsored by Intel Security
WHITE PAPER: In this informative report, discover why McAfee's Enterprise Security Manager is turning heads in the security industry.
Posted: 05 Sep 2014 | Published: 25 Jun 2014

Intel Security

It’s All About the App: Mobile Security That Helps Enable the Business
sponsored by CA Technologies.
WHITE PAPER: This white paper reveals why mobile application security is crucial element of your business.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

CA Technologies.

451 Research Report: AlienVault USM - A Security Operations Center for the SMB
sponsored by AlienVault
WHITE PAPER: This in-depth 451 Research analysis examines AlienVault, a security vendor tailored for small and midsize businesses.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

AlienVault

PCI DSS Questions Answered: Solutions To Tough Compliance Problems
sponsored by Pwine Express
WHITE PAPER: In this expert Q&A, get expert answers to the compliance and security issues that are most affecting the payment card industry today.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

Pwine Express

Bloomberg Research – Test & Secure Mobile Apps
sponsored by Hewlett-Packard Company
WHITE PAPER: According to this Bloomberg research report, only 51% of businesses test their apps for security before deployment. Access this report to learn about a technology that will help you avoid exposing your corporate data, losing brand equity and suffering financial loss through breaches of your mobile applications.
Posted: 05 Sep 2014 | Published: 30 Sep 2013

Hewlett-Packard Company

Bloomberg Research - Business/IT view of App Security
sponsored by Hewlett-Packard Company
WHITE PAPER: In this Bloomberg research report, learn about the security issues surrounding mobile applications. Discover what business leaders and IT decision-makers agree and disagree on in regard to mobile apps, and why both groups are reluctant to express total satisfaction with their current ability to take advantage of the mobility trend.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

Hewlett-Packard Company

How to Reverse Engineer Domain Ownership in a Cyber Investigation
sponsored by DomainTools
WHITE PAPER: In this in-depth resource, discover the top security strategies that can help security uncover vital insights into the true identify of cyber attackers.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

DomainTools

SAP Case Study
sponsored by Hewlett-Packard Company
CASE STUDY: With the escalating number and increasing sophistication of cyber-attacks, perimeter defenses are no longer enough. Companies who used HP Fortify on Demand—a cloud-based solution—saw results and achieved time to value faster. Read the report to learn how.
Posted: 04 Sep 2014 | Published: 31 Jul 2013

Hewlett-Packard Company

2013 Cyber Risk Executive Summary
sponsored by Hewlett-Packard Company
WHITE PAPER: The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat landscape. It provides information you need to effectively plan your cyber security strategy and deploy your defenses.
Posted: 04 Sep 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

Piercing the Veil of Masked Cyber Criminals
sponsored by DomainTools
WHITE PAPER: In this helpful white paper, discover a new security solution that can help you identify cyber criminals, build a cyber-attack profile, and more effectively protect your valuable data and assets.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

DomainTools

Mitigating Security Risks at the Network's Edge: Best Practices for Distributed Enterprises
sponsored by CradlePoint
WHITE PAPER: Access this white paper to discover the keys to preventing data breaches in distributed enterprises.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

CradlePoint

Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

Verizon PCI Report: Pen Testing, Passwords Cause PCI Assessment Gaffes
sponsored by Pwine Express
WHITE PAPER: In this expert guide, get critical insights on how you can help your organization meet PCI compliance regulations despite the many security challenges.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

Pwine Express

The 10-Minute Guide to Cloud Encryption Gateways
sponsored by CipherCloud
WHITE PAPER: Learn about the innovative solutions that have been developed to address the security concerns regarding business applications in the cloud.
Posted: 03 Sep 2014 | Published: 31 Dec 2013

CipherCloud

Managed Mobility Services: Reduce Your Risk and Improve Productivity
sponsored by Hewlett-Packard Limited
WHITE PAPER: Learn how HP Managed Mobility Services can help your organisation manage secure access to applications and data, and let users store, sync and share files anytime, anywhere, from any mobile device.
Posted: 02 Sep 2014 | Published: 29 Aug 2014

Hewlett-Packard Limited

The Next Generation of Data-Driven Security
sponsored by MapR Technologies
WHITE PAPER: In this in-depth white paper, get the facts on how new adaptive algorithms like Machine Learning and Big Data can identify security risks that other outdated techniques simply couldn't.
Posted: 02 Sep 2014 | Published: 30 Jun 2014

MapR Technologies

e-Guide: Conquering Advanced Persistent Threat Attacks
sponsored by CDW Corporation
EGUIDE: This expert e-Guide clears up common misconceptions about the dangers and characteristics of advanced persistent threats (APTs), and also explains how context-aware security can improve the detection of APTs within enterprises.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

CDW Corporation
151 - 175 of 2704 Matches Previous Page    5 6 7 8 9 10    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement